Impact & Risk Analysis
- Severity: High
- CIS Benchmark: CIS 5.1.8
- Impact: Privilege Escalation to Cluster Admin. These three permissions are “meta-permissions” that allow a user to bypass their assigned restrictions:
- Impersonate: Allows a user to act as another user (e.g.,
system:admin) or group (system:masters), instantly inheriting their rights. - Bind: Allows a user to create a RoleBinding to a Role that has more permissions than the user currently holds (effectively gifting themselves admin rights).
- Escalate: Allows a user to edit a Role to add permissions that they do not possess themselves.
- Impersonate: Allows a user to act as another user (e.g.,
Common Misconfiguration
Granting* (all) verbs to a “namespace admin” role. This inadvertently includes bind and escalate, allowing that local admin to potentially break out of their namespace or become a cluster admin.
Vulnerable Example
Secure Example
Audit Procedure
Review the users and roles who have access toimpersonate, bind, or escalate verbs.
- Analyze: Identify any non-system role containing these verbs.
- Fail: If a standard user role contains
impersonate,bind, orescalate.
Remediation
Where possible, remove theimpersonate, bind, and escalate rights from subjects.
- Impersonate: Should only be held by system components (like ingress controllers) that need to act on behalf of users.
- Bind/Escalate: Should generally be restricted to the
cluster-adminrole. If you need delegated administration, rely on the built-in Kubernetes prevention mechanism (which blocks binding to higher roles) rather than explicitly granting thebindorescalateverb override.

